Site icon Eminence Papers

Lab 6 – LAN-to-WAN Domain

Lab 6 – LAN-to-WAN Domain

Lab 6.1a

The three STIGs discussed are Cisco Internetwork Operating System (IOS) STIG, Solaris 11 STIG, and Red Hat Enterprise Linux 7 STIG. The Cisco IOS STIG comprises instructions that can secure the Cisco IOS devices. Some rule settings encompassed within the set of instructions include but are not limited to data protection, auditing and monitoring, and infrastructure and communications monitoring (Kim & Solomon, 2021). The Solaris 11 STIG, on the other hand, is composed of guidance that secures Solaris 11 systems. The direction entails features and capabilities common to most Solaris 11 systems. These features include physical and environmental protection, authorization and access control, and system and information integrity. The last example of STIG for evaluation is the Red Hat Enterprise Linux 7 STIG, which offers guidance to enterprise Linux 7 systems (Kim & Solomon, 2021). The guidance includes rule settings for various features such as maintenance, infrastructure, communications protection, accounts, and authentication. Some of the DoD’s workstation hardening guidelines:

  1. Enhance auditing.
  2. Restricted access to privileged accounts.
  1. Installation of personal firewalls.
  2. Configuration of security features in applications.
  3. Lockdown of server consoles.

Lab 6.1b

Various risks, threats, and vulnerabilities are commonly found in the LAN-to-WAN domain. The first category of these risks is malicious code, also identified as Trojan horses. The Trojan horse is designed to damage the computer or gain unauthorized access for illegitimate control. The other threat is network sniffers that hackers may use to capture the traffic of a network and thereby illegally access usernames, passwords, and electronic mail. Furthermore, distributed attack tools are similar to sniffers but contain a wider scope and have the capability of affecting large numbers of computers on a network. Lastly, the denial of service tools also threatens the LAN-to-WAN domain by disrupting the accessibility of network resources such as servers and websites.

Five major system-hardening processes that can be adopted within the network infrastructure include;

Lab 6.1c

Enclave Perimeter

Firewall

Lab 6.1d

Non-registered or Unauthorized IP Addresses

Non-registered IP addresses are unexpected addresses that are not flagged by the OpenDNS IP layer enforcement solution. This traffic can be linked to routes set on the client side by the user and often indicates malicious activity that interferes with the device’s routing table (Kim & Solomon, 2021). In most cases/incidents, unauthorized IP addresses are brought about by a user trying to bypass the organization’s security system to gain access to the internet.

in-Band Mgt Not Configured To Timeout In 10 Min

The in-band management needs to be configured to time out in 10 minutes to reduce the level of protection offered to the critical network components. The IT professionals should review the management connection and have the network element configured to timeout the connection at ten minutes or less of inactivity to increase protection.

Exclusive Use of Privileged and Non-Privileged

Exclusive use of privileged accounts refers to a user account with more privileges than ordinary users. These exclusive use privileges may include installing or removing software and modifying or upgrading the operating system (Kim & Solomon, 2021). On the other hand, non-privileged accounts lack these privileges. In other words, their functionality could be much better.

Assign The Lowest Privilege Level To User Accounts

The lowest privilege level assigned to user accounts entails strictly limiting users’ access rights to information so they can perform their jobs.

Log All In-Band Management Access Attempts

This is a method of network management that permits actual management traffic to use the same path in communicating with various network nodes. However, this log of all in-band management access attempts can only be used in small-scale networks.

Lab 6.1e

A log or Syslog statement that only follows some deny statements makes it easier to identify configuration errors, fewer disruptions would be experienced with the troubleshooting service, and hardly the network would be scanned (Kim & Solomon, 2021). Syslog levels 0-6 are required for the system to collect relevant information to help recover.

The definition of a DNS server narrows down to DNS hostname and IP address mapping. These elements allow the user on the source host to access login, authentication, and other sensitive data.

When startup configurations are not synchronized, this problem causes the appearance of yellow lines on the hostname. This problem will prevent the system from restarting properly after the integrated change.

Lab 6.1f  

Some methods adopted for hardening Cisco firewalls include general control plane hardening, general data plane hardening, and general management plane hardening. The general control plane hardening involves the protection of the control plane to foster quick recovery of the stability of the network in the case of a security bridge. Conversely, general data plane hardening boasts network functionality by enhancing network features like IP options and, more specifically, the routing option (Kim & Solomon, 2021). Finally, the general management plane hardening entails securing critical features such as access and configuration that also aid in improving the control plane operations.

Lab 6.1g

  1. Server hardening entails securing a server’s data, components, functions, and permissions using advanced measures at the hardware and software layers.
  2. Database hardening involves securing both the digital and database management systems (DBMS). It encompasses three major processes: limiting user privileges, disabling unnecessary database functions, and securing database information.

Lab 6.1h

  1. Patching and updating the operating system: The patching process entails correcting the OS by identifying vulnerabilities and mitigating and installing permanent fixes.
  2. Configuring resource controls appropriately: Appropriate configuring of resource controls and intentional and unintentional security breaches can be reduced greatly.

Lab 6.2

Some of the top LAN-to-WAN domain risks, threats, and vulnerabilities are unauthorized access, unauthorized probing, and port scanning, as well as the local user downloading unknown file types from unknown sources. Unauthorized access occurs in the sense that third-party individuals can intrude into this domain (Johnson & Easttom, 2020). Unauthorized probing refers to a technique used by attackers to gather as much information as possible about a web application (Johnson & Easttom, 2020).

There are various mitigation measures that I would adopt to audit the LAN-to-WAN domain for compliance purposes. For the threat of unauthorized access, I would apply strict security monitoring controls to detect and prevent any intrusion activities. The probing and port scanning issue would be avoided by disabling these functionalities on all exterior IP devices within this domain framework (Johnson & Easttom, 2020). I will disallow the IP port numbers that hackers capitalize on for probing and scanning the organization’s system.

References

Johnson, R., & Easttom, C. (2020). Security policies and implementation issues. Jones & Bartlett Learning.

Kim, D., & Solomon, M. G. (2021). Fundamentals of information systems security. Jones & Bartlett Learning.

ORDER A PLAGIARISM-FREE PAPER HERE

We’ll write everything from scratch

Question 


Lab 6 – LAN-to-WAN Domain

This homework assignment aims to learn how to audit the LAN-to-WAN domain. You will identify common risks, threats, and vulnerabilities in the LAN-to-WAN domain. You will assess common risks, threats, and vulnerabilities in the LAN-to-WAN domain and identify network and security policies needed to secure the LAN-to-WAN portion of the network infrastructure properly. You will audit and assess the implementation of security controls within the LAN-to-WAN domain and recommend LAN-to-WAN domain hardening solutions by implementing proper security controls at the Internet ingress/egress point within an IT infrastructure. You will use a text document to develop your homework assignment by completing the sections listed below:

Exit mobile version